The Right to Quantitative Privacy

Total Page:16

File Type:pdf, Size:1020Kb

The Right to Quantitative Privacy Article The Right to Quantitative Privacy David Grayt & Danielle Citron" Introduction ......................................... 63 I. Quantitative Privacy: The Perils of Broad and Indiscriminate Surveillance .................... 73 II. Quantitative Privacy and the Fourth Amendment ...... 83 A. Qualitative Privacy: The Fourth Amendment Before United States v. Jones ................. 83 B. A Fourth Amendment Foothold for Quantitative Privacy in United States v. Jones .............. 87 C. The Fourth Amendment Foundations of t Professor of Law, University of Maryland Francis King Carey School of Law. tt Lois K. Macht Research Professor & Professor of Law, University of Maryland Francis King Carey School of Law, Affiliate Scholar, Stanford Cen- ter on Internet and Society, Affiliate Fellow, Yale Information Society Project. The authors thank everyone who generously commented on this work during presentations at Yale's Information Society Project, the Annual Meeting of the ABA/AALS Criminal Law Section, the University of North Carolina, North- western, Yale's Conference on Locational Privacy and Biometrics, Law and So- ciety, the Privacy Law Scholars Conference, and the Computers, Freedom, and Privacy Conference, and during conversations at the American Law Institute Meeting on Information Privacy Law and Harvard Law Review's Symposium on Informational Privacy. Particular thanks go to Ronald Allen, Julia Angwin, Jack Balkin, Kevin Bankston, Steve Bellovin, Marc Blitz, Richard Boldt, Becky Bolin, Mary Bowman, Al Brophy, Andrew Chin, Bryan Choi, Thomas Clancy, Julie Cohen, Thomas Crocker, Nick Doty, LisaMarie Freitas, Susan Freiwald, Barry Friedman, Brandon Garrett, Bob Gellman, Don Gifford, Mark Graber, John Grant, James Grimmelmann, Deborah Hellman, Leslie Meltzer Henry, Lance Hoffman, Rende Hutchins, Camilla Hrdy, Orin Kerr, Joseph Kennedy, Catherine Kim, Anne Klinefelter, Avner Levin, Michael Mannheimer, Dan Markel, Christina Mulligan, Richard Myers, Neil Richards, Catherine Sabbeth, Laurent Sacharoff, Paul Schwartz, Christopher Slobogin, Robert Smith, Dan Solove, Max Stearns, David Super, Harry Surden, Peter Swire, Peter Quint, Jason Weinstein, Arthur Weisburd, and Jonathan Witmer-Rich. We also thank Liz Clark Rinehart for her research assistance and Max Siegel for his insightful editing. Finally, we are grateful to Frank Lancaster for holding us together. Copyright @ by David Gray and Danielle Citron. 62 20131 QUANTITATIVE PRIVACY 63 Quantitative Privacy .................. ..... 92 III. The Technology-Centered Approach to Quantitative Privacy ........................... 101 A. Fourth Amendment Precedents for a Technology-Centered Approach ....... ......... 103 B. The Technology-Centered Approach and Aerial Surveillance Drones .................. ..... 105 C. The Technology-Centered Approach and Data Aggregation ......................... .... 112 D. The Technology-Centered Approach and Human Surveillance ............................. 124 IV. Some Concerns About Quantitative Privacy in Practice . 125 A. The Technology-Centered Approach Resolves Practical Challenges .................. ..... 126 B. The Technology-Centered Approach and the Public Observation Doctrine ................. 131 C. The Technology-Centered Approach and the State Agency Requirement ............. ..... 133 D. The Technology-Centered Approach and the Third-Party Doctrine ................. ..... 137 Conclusion ................................. ..... 144 INTRODUCTION In June and July 2013, documents leaked by a government contractor revealed details of three expansive surveillance pro- grams operated by the Federal Bureau of Investigation (FBI) and the Department of Defense on behalf of the National Secu- rity Agency (NSA).' The first requires that Verizon and other telecommunication companies provide to the NSA on a daily basis "all call detail records or 'telephony metadata' created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local 1. See Barton Gellman & Laura Poitras, U.S., British Intelligence Min- ing Data from Nine U.S. Internet Companies in Broad Secret Program,WASH. POST, June 6, 2013, http://www.washingtonpost.com/investigations/us -intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret -program/2013/06/06/3aOcOda8-cebf-11e2-8845-d970ccb4497_story.html; Glenn Greenwald, NSA Collecting Phone Records of Millions of Verizon Cus- tomers Daily, GUARDIAN, June 5, 2013, http://www.theguardian.com/world/ 2013/jun/06/nsa-phone-records-verizon-court-order [hereinafter Greenwald, Phone Records]; Glenn Greenwald, XKeyscore: NSA Tool Collects 'Nearly Eve- rything a User Does on the Internet,' GUARDIAN, July 31, 2013, http://www .theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data [here- inafter Greenwald, XKeyscore]. 64 MINNESOTA LAW RE VIEW [98:62 telephone calls."2 Although this program does not allow for the collection of content, including customers' conversations, te- lephony metadata is a rich source of information, giving au- thorities vast knowledge about callers' identity, location, and social networks.' A second program, referred to in leaked doc- uments as "PRISM," reportedly allows the NSA and the FBI to access "audio and video chats, photographs, e-mails, docu- ments, and connection logs" collected by nine leading U.S. in- ternet companies, including Google and Facebook.4 The third program, called XKeyscore, provides analysts with the capacity to mine content and metadata generated by e-mail, chat, and browsing activities through a global network of servers and in- ternet access points. These revelations confirm previous re- ports about a comprehensive domestic surveillance program that seeks to provide government agents with contemporary and perpetual access to details about everywhere we go and everything we do, say, or write, particularly when using or in the company of networked technologies.! 2. Verizon Forced to Hand Over Telephone Data-Full Court Ruling, GUARDIAN, June 5, 2013, http://www.theguardian.com/world/interactive/2013/ jun/06/verizon-telephone-data-court-order [hereinafter FISA]. The NSA subse- quently released a declassified version of the order. See Declassified Govern- ment Documents Related to NSA Collection of Telephone Metadata Records, WASH. POST, http://apps.washingtonpost.com/g/page/politics/government -documents-related-to-nsa-collection-of-telephone-metadata-records/351/ (last visited Oct. 15, 2013). 3. Dan Roberts & Spencer Ackerman, Anger Swells After NSA Phone Records Court Order Revelations, GUARDIAN, June 6, 2013, http://www .theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon -records ("[Telephony] metadata . can provide authorities with vast knowledge about a caller's identity. [C]ross-checked against other public records, the metadata can reveal someone's name, address, driver's license, credit history, social security number and more."). 4. Gellman & Poitras, supra note 1. The companies identified as partici- pants in PRISM have denied granting government agents open access to their servers. Id. As of this writing, the full truth of the program remains hidden behind a veil of alleged national security necessity. 5. Greenwald, XKeyscore, supra note 1. 6. See JAMES BAMFORD, THE SHADOW FACTORY 177-96 (2008) [hereinaf- ter BAMFORD, SHADDOW]; James Bamford, The NSA Is Building the Country's Biggest Spy Center, WIRED MAG., Mar. 15, 2012, available at http-//www.wired .com/threatlevel/2012/03/ffnsadatacenter/all/1 [hereinafter Bamford, The NSA is Building]; Michael Isikoff, The Fed Who Blew the Whistle, NEWSWEEK (Dec. 12, 2008), http://www.thedailybeast.com/newsweek/2008/12/12/the-fed -who-blew-the-whistle.html; James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES, Dec. 15, 2005, http://www.nytimes .com/2005/12/16/politics/16program.html?pagewanted=all. 20131 QUANTITATIVE PRIVACY 65 The domestic surveillance infrastructure is not confined to our networked communications, however. Consider aerial drones. No longer just a feature of modern warfare, unmanned aerial drones now populate domestic airspace.' Military-style drones operate along the United States border with Mexico.' Farther inland, law enforcement agencies are starting to use a variety of drones during their routine police operations.! Many of these drones are hardly visible, and some are as small as in- sects.o Among the primary advantages of these drone surveil- lance systems is that they are "covert."" As one operator re- ported: "You don't hear it, and unless you know what you're looking for, you can't see it."" Drones are also increasinqly in- expensive, with some costing just a few hundred dollars. Giv- en the diversity, power, secrecy, and increasingly modest cost of aerial drones, we should expect them to become a more and more common presence in our skies.' 4 We are also increasingly subject to surveillance by systems capable of aggregating and analyzing large quantities of infor- mation from a variety of sources. Take, for example, New York's "Domain Awareness System" (DAS), which was unveiled by Mayor Michael Bloomberg and Police Commissioner Ray- 7. See Lev Grossman, Drone Home, TIME MAG., Feb. 11, 2013, at 28, 31- 33; Jennifer Lynch, Are Drones Watching You?, ELECTRONIC FRONTIER FOuND. (Jan. 10, 2012), httpsJ/www.eff.org/deeplinks/2012/01/drones-are -watching-you. In the United States, "50 companies, universities, and govern- ment organizations are developing and producing some 155 unmanned
Recommended publications
  • LGST 642X Q2 2016 Syllabus 101816
    LGST 642x Big Data, Big Responsibilities: The Law and Ethics of Business Analytics Q2 2016 | MW 10:30am-12pm | JMHH F65 Overview Significant technologies always have unintended consequences, and their effects are never neutral. A world of ubiquitous data, subject to ever more sophisticated collection, aggregation, analysis, and use, creates massive opportunities for both financial gain and social good. It also creates dangers in areas such as privacy and discrimination, as well as simple hubris about the effectiveness of management by algorithm. This course introduces students to the legal, policy, and ethical dimensions of big data, predictive analytics, and related techniques. It then examines responses—both private and governmental—that may be employed to address these concerns. Instructor Associate Professor Kevin Werbach Department of Legal Studies and Business Ethics 673 Huntsman Hall (215) 898-1222 [email protected] (best way to reach me) Office Hours: Monday 12:30-2pm, or by appointment Learning Objectives Good data-driven decision-making means not just generating solutions, but understanding how to use them. Some of the most sophisticated firms in terms of data science expertise have already gotten into trouble over concerns about privacy, security, manipulation, and discrimination. Failure to anticipate such issues can result in ethical lapses, public relations disasters, regulatory sanctions, and even legal liability. My goal is to help you develop the skills to use analytics in the most responsible way, while remaining focused on your business objectives. After completion of the course, you should be able to: 1. Identify where algorithms depend on human judgments or assumptions. 2.
    [Show full text]
  • The New Investor Tom C.W
    The New Investor Tom C.W. Lin EVIEW R ABSTRACT A sea change is happening in finance. Machines appear to be on the rise and humans on LA LAW LA LAW the decline. Human endeavors have become unmanned endeavors. Human thought and UC human deliberation have been replaced by computerized analysis and mathematical models. Technological advances have made finance faster, larger, more global, more interconnected, and less human. Modern finance is becoming an industry in which the main players are no longer entirely human. Instead, the key players are now cyborgs: part machine, part human. Modern finance is transforming into what this Article calls cyborg finance. This Article offers one of the first broad, descriptive, and normative examinations of this sea change and its wide-ranging effects on law, society, and finance. The Article begins by placing the rise of artificial intelligence and computerization in finance within a larger social context. Next, it explores the evolution and birth of a new investor paradigm in law precipitated by that rise. This Article then identifies and addresses regulatory dangers, challenges, and consequences tied to the increasing reliance on artificial intelligence and computers. Specifically, it warns of emerging financial threats in cyberspace, examines new systemic risks linked to speed and connectivity, studies law’s capacity to govern this evolving financial landscape, and explores the growing resource asymmetries in finance. Finally, drawing on themes from the legal discourse about the choice between rules and standards, this Article closes with a defense of humans in an uncertain financial world in which machines continue to rise, and it asserts that smarter humans working with smart machines possess the key to better returns and better futures.
    [Show full text]
  • You Might Be a Robot
    \\jciprod01\productn\C\CRN\105-2\CRN203.txt unknown Seq: 1 28-MAY-20 13:27 YOU MIGHT BE A ROBOT Bryan Casey† & Mark A. Lemley‡ As robots and artificial intelligence (AI) increase their influ- ence over society, policymakers are increasingly regulating them. But to regulate these technologies, we first need to know what they are. And here we come to a problem. No one has been able to offer a decent definition of robots and AI—not even experts. What’s more, technological advances make it harder and harder each day to tell people from robots and robots from “dumb” machines. We have already seen disas- trous legal definitions written with one target in mind inadver- tently affecting others. In fact, if you are reading this you are (probably) not a robot, but certain laws might already treat you as one. Definitional challenges like these aren’t exclusive to robots and AI. But today, all signs indicate we are approaching an inflection point. Whether it is citywide bans of “robot sex brothels” or nationwide efforts to crack down on “ticket scalp- ing bots,” we are witnessing an explosion of interest in regu- lating robots, human enhancement technologies, and all things in between. And that, in turn, means that typological quandaries once confined to philosophy seminars can no longer be dismissed as academic. Want, for example, to crack down on foreign “influence campaigns” by regulating social media bots? Be careful not to define “bot” too broadly (like the California legislature recently did), or the supercomputer nes- tled in your pocket might just make you one.
    [Show full text]
  • Charles Forelle, James Bandler and Mark Maremont of the Wall Street Journal Win Goldsmith Prize for Investigative Reporting
    CONTACT: Molly Lanzarotta March 5, 2013 Harvard Kennedy School Communications 617-495-1144 Patricia Callahan, Sam Roe and Michael Hawthorne of the Chicago Tribune Win Goldsmith Prize for Investigative Reporting CAMBRIDGE, MASS – The $25,000 Goldsmith Prize for Investigative Reporting has been awarded to Patricia Callahan, Sam Roe and Michael Hawthorne of the Chicago Tribune by the Joan Shorenstein Center on the Press, Politics and Public Policy for their investigative report “Playing with Fire." The Shorenstein Center is part of the John F. Kennedy School of Government at Harvard University. The Chicago Tribune’s investigative series revealed how a deceptive campaign by the chemical and tobacco industries brought toxic flame retardants into people’s homes and bodies, despite the fact that the dangerous chemicals don’t work as promised. As a result of the investigation, the U.S. Senate revived toxic chemical reform legislation and California moved to revamp the rules responsible for the presence of dangerous chemicals in furniture sold nationwide. “The judges this year were especially struck by the initiative shown in recognizing a very important policy issue embedded in something as familiar and unthreatening as a sofa,” said Alex S. Jones, Director of the Shorenstein Center. “It goes to prove the importance of not just looking, but seeing and acting.” Launched in 1991, the Goldsmith Prize for Investigative Reporting honors journalism which promotes more effective and ethical conduct of government, the making of public policy, or the practice of politics by disclosing excessive secrecy, impropriety and mismanagement. The five finalists for the Goldsmith Prize for Investigative Reporting were: Alan Judd, Heather Vogell, John Perry, M.B.
    [Show full text]
  • Law As Source: How the Legal System Facilitates Investigative Journalism
    YALE LAW & POLICY REVIEW Law as Source: How the Legal System Facilitates Investigative Journalism Roy Shapir Legal scholarshave long recognized that the media plays a key role in assuring the proper functioning of political and business markets Yet we have understudied the role of law in assuring effective media scrutiny. This Article develops a theory of law as source. The basicpremise is that the law not only regulates what the media can or cannot say, but also facilitates media scrutiny by producing information. Specifically, law enforcement actions, such as litigationor regulatory investigations, extract information on the behaviorofpowerfulplayers in business or government. Journalists can then translate the information into biting investigative reports and diffuse them widely, thereby shapingplayers' reputationsand norms. Levels of accountabilityin society are therefore not simply a function of the effectiveness of the courts as a watchdog or the media as a watchdog but rather a function of the interactions between the two watchdogs. This Article approaches, from multiple angles, the questions of how and how much the media relies on legal sources. I analyze the content of projects that won investigative reportingprizes in the past two decades; interview forty veteran reporters; scour a reporters-onlydatabase of tip sheets and how-to manuals; go over * IDC Law School. I thank participants in the Information in Litigation Roundtable at Washington & Lee, the Annual Corporate and Securities Litigation Workshop at UCLA, several conferences at IDC, the American Law and Economics Association annual conference at Boston University, and the Crisis in the Theory of the Firm conference and the Annual Reputation Symposium at Oxford University, as well as Jonathan Glater, James Hamilton, Andrew Tuch, and Verity Winship for helpful comments and discussions.
    [Show full text]
  • Victories for Privacy and Losses for Journalism? Five Privacy Controversies from 2004 and Their Policy Implications for the Future of Reportage Clay Calvert
    Journal of Law and Policy Volume 13 Issue 2 SCIENCE FOR JUDGES IV: Article 8 Agent Orange Revisited and Human Behavior Research 2005 Victories for Privacy and Losses for Journalism? FIve Privacy Controversies from 2004 and Their Policy Implications for the Future of Reportage Clay Calvert Follow this and additional works at: https://brooklynworks.brooklaw.edu/jlp Recommended Citation Clay Calvert, Victories for Privacy and Losses for Journalism? FIve Privacy Controversies from 2004 and Their Policy Implications for the Future of Reportage, 13 J. L. & Pol'y (2005). Available at: https://brooklynworks.brooklaw.edu/jlp/vol13/iss2/8 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Journal of Law and Policy by an authorized editor of BrooklynWorks. CALVERT MACROED CORRECTED 060605.DOC 6/20/2005 7:10 PM VICTORIES FOR PRIVACY AND LOSSES FOR JOURNALISM? FIVE PRIVACY CONTROVERSIES FROM 2004 AND THEIR POLICY IMPLICATIONS FOR THE FUTURE OF REPORTAGE Clay Calvert∗ INTRODUCTION A primary role of the press in a democratic society, protected broadly in the United States under the First Amendment,1 is to fairly, truthfully, and comprehensively report to citizens on matters of public concern.2 The ethics code of the Radio-Television News ∗ Associate Professor of Communications & Law and Co-Director of the Pennsylvania Center for the First Amendment at The Pennsylvania State University. B.A., 1987, Communication, Stanford University; J.D. (Order of the Coif), 1991, McGeorge School of Law, University of the Pacific; Ph.D., 1996, Communication, Stanford University.
    [Show full text]
  • Downloadable Business Audiobooks Duke.Lib.Overdrive.Com
    Downloadable Business Audiobooks duke.lib.overdrive.com = Recently Added! o #AskGaryVee, by Gary Vaynerchuk o 101 Secrets of Highly Effective Speakers, by Caryl Rae Krannich o #GIRLBOSS by Sophia Amoruso o The 250 Job Interview Questions, by Peter Veruki o 2030 by Mauro Guillen o The 5AM Club, by Robin Sharma o 24/6: The Power of Unplugging One Day a Week by Tiffany Shlain o The Achievement Habit, by Bernard Roth o The 4% Fix by Karma Brown o Acing the Interview, by Tony Beshara o The 7 Habits of Highly Effective People, by Stephen R o Acting with Power by Deborah Gruenfeld Covey o Aftermath by James Rickards o 7 Skills That Will Catapult Your Career, by Stephen R. Thorne o The Age of Cryptocurrency, by Paul Vigna o The 10-Step Stress Solution, by Neil Shah o The Age of Surveillance Capitalism, by Shoshana Zuboff o 12, by Rodd Wagner o Agent of Influence, by Jason Hanson o 13 Bankers, by Simon Johnson o AgeProof, by Jean Chatzky o The 15 Invaluable Laws of Growth, by John C Maxwell o Ages of American Capitalism by Jonathan Levy o The 2-Hour Job Search, by Steve Dalton o Agile by Jonathan Todd Ross o The 21 Success Secrets of Self-Made Millionaires, by o The AI-First Company by Ash Fontana Brian Tracy o Aim High by Deborah Lee James o 25 Things to Say to the Interviewer, by Dexter Hawk o The Aisles Have Eyes, by Joseph Turow o The 30-Day Money Cleanse, by Ashley Feinstein Gerstley o The Alchemists, by Neil Irwin o 30 Days: Change Your Habits, Change Your Life by Marc Reklau o Alchemy, by Rory Sutherland o 30-Second Psychology, by Christian
    [Show full text]
  • Regulating Excessive Executive Compensation - Why Bother? Jerry W
    Journal of Business & Technology Law Volume 2 | Issue 2 Article 6 Regulating Excessive Executive Compensation - Why Bother? Jerry W. Markham Follow this and additional works at: http://digitalcommons.law.umaryland.edu/jbtl Part of the Business Organizations Law Commons Recommended Citation Jerry W. Markham, Regulating Excessive Executive Compensation - Why Bother?, 2 J. Bus. & Tech. L. 277 (2007) Available at: http://digitalcommons.law.umaryland.edu/jbtl/vol2/iss2/6 This Article is brought to you for free and open access by the Academic Journals at DigitalCommons@UM Carey Law. It has been accepted for inclusion in Journal of Business & Technology Law by an authorized editor of DigitalCommons@UM Carey Law. For more information, please contact [email protected]. JERRY W. MARKHAM* Regulating Excessive Executive Compensation- Why Bother? "The thing that differentiates animals and man is money." Gertrude Stein I. INTRODUCTION ............................................... 278 II. FIDUCIARY DUTIES AND FULL DISCLOSURE ....................... 279 A. The Robber Barons ........................................ 279 B. Fiduciary D uties ........................................... 280 C. SEC Full Disclosure ........................................ 284 III. TAX LAWS AND OPTIONS ....................................... 287 A. The Tax Laws ............................................. 287 B. Golden Parachutes ......................................... 291 C. Options ................................................... 293 D. Option Scandals ..........................................
    [Show full text]
  • The Debt Resistors' Operations Manual Join the Resistance!
    THE DEBT RESISTORS' OPERATIONS MANUAL JOIN THE RESISTANCE! THIS OPERATIONS MANUAL—WRIT- TEN BY AN ANONYMOUS COLLECTIVE OF RESISTORS, DEFAULTERS AND ALLIES FROM STRIKE DEBT AND OCCUPY WALL ST R E E T—IS FOR ALL THOSE BEING CRUSHED UNDER THE WEIGHT OF DEBT. IT AIMS TO PROVIDE SPECIFIC TACTICS FOR UNDERSTANDING AND FIGHTING AGAINST THE DEBT SYSTEM SO THAT WE CAN ALL RECLAIM OUR LIVES AND OUR COMMUNITIES. IT CONTAINS PRACTICAL INFORMATION, RESOURCES AND INSIDER TIPS FOR INDIVIDUALS DEALING WITH THE DILEMMA OF INDEBTEDNESS IN THE UNITED STATES TODAY AND ALSO INTRO- DUCES IDEAS FOR THOSE WHO HAVE MADE THE DECISION TO TAKE COLLEC- TIVE ACTION. THE DEBT RESISTORS' OPERATIONS MANUAL a project of STRIKE DEBT / OCCUPY WALL STREET THE DEBT RESISTORS' OPERATIONS MANUAL SEPTEMBER 2012 cna This work is licensed under the Creative Commons Attribution-NonCommer- cial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ PRODUCED AS A COLLABORATION BETWEEN Members of the Strike Debt assembly / strikedebt.org Occupy Wall Street / occupywallstreet.org Common Notions / commonnotions.org Antumbra Design / antumbradesign.org P R E FA C E This operations manual—written by an anonymous collec- tive of resistors, defaulters and allies from Strike Debt and Occupy Wall Street—is for all those being crushed under the weight of debt. It aims to provide specific tactics for understanding and fighting against the debt system so that we can all reclaim our lives and our communities. It con- tains practical information, resources and insider tips for individuals dealing with the dilemma of indebtedness in the United States today and also introduces ideas for those who have made the decision to take collective action.
    [Show full text]
  • The Black Box Society
    THE BLACK BOX SOCIETY THE BLACK BOX SOCIETY The Secret Algorithms That Control Money and Information FRANK PASQUALE Cambridge, Massachusetts London, En gland 2015 Copyright © 2015 by the President and Fellows of Harvard College All rights reserved Printed in the United States of America Library of Congress Cataloging-in- Publication Data Pasquale, Frank. The black box society : the secret algorithms that control money and information / Frank Pasquale. pages cm Includes bibliographical references and index. ISBN 978- 0-674- 36827- 9 1. Power (Social sciences) 2. Elite (Social sciences) 3. Knowledge, Theory of. 4. Observation (Psychology) I. Title. HN49.P6.P375 2015 303.3—dc23 2014013480 For Ray In Memory of my Parents CONTENTS 1 Introduction—The Need to Know 1 2 Digital Reputation in an Era of Runaway Data 19 3 The Hidden Logics of Search 59 4 Finance’s Algorithms: The Emperor’s New Codes 101 5 Watching (and Improving) the Watchers 140 6 Toward an Intelligible Society 189 Notes 221 Ac know ledg ments 305 Index 307 [T]here is one world in common for those who are awake, but [when] men are asleep each turns away into a world of his own. —Heracleitus Million- fuelèd, ꞌ nature’s bonfi re burns on. But quench her bonniest, dearest ꞌ to her, her clearest- selvèd spark Man, how fast his fi redint, ꞌ his mark on mind, is gone! Both are in an unfathomable, all is in an enormous dark Drowned. —Gerard Manley Hopkins 1 INTRODUCTION—THE NEED TO KNOW EVERYBODY KNOWS the story about the man crawling intently around a lamppost on a dark night.
    [Show full text]
  • MANAGED by the MARKETS This Page Intentionally Left Blank MANAGED by the MARKETS How Finance Reshaped America
    MANAGED BY THE MARKETS This page intentionally left blank MANAGED BY THE MARKETS How Finance Reshaped America GERALD F. DAVIS 1 2009 3 Great Clarendon Street, Oxford ox2 6dp Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries Published in the United States by Oxford University Press Inc., New York ©GeraldF.Davis2009 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2009 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloging in Publication Data Data available Typeset by SPI Publisher Services, Pondicherry, India Printed in Great Britain on acid-free paper by CPI Antony Rowe, Chippenham, Wiltshire ISBN 978–0–19–921661–1 13579108642 PREFACE In the fall of 2008, financial institutions in the United States underwent a period of upheaval not seen since the wave of bank failures that led off the Great Depression.
    [Show full text]
  • AI) Increase Their Influence Over Society, Policymakers Are Increasingly Regulating Them
    You Might Be a Robot1 Mark A. Lemley2 & Bryan Casey3 Abstract As robots and artificial intelligence (AI) increase their influence over society, policymakers are increasingly regulating them. But to regulate these technologies, we first need to know what they are. And here we come to a problem. No one has been able to offer a decent definition of robots and AI—not even experts. What’s more, technological advances make it harder and harder each day to tell people from robots and robots from “dumb” machines. We’ve already seen disastrous legal definitions written with one target in mind inadvertently affecting others. In fact, if you’re reading this you’re (probably) not a robot, but certain laws might already treat you as one. Definitional challenges like these aren’t exclusive to robots and AI. But today, all signs indicate we’re approaching an inflection point. Whether it’s citywide bans of “robot sex brothels” or nationwide efforts to crack down on “ticket scalping bots,” we’re witnessing an explosion of interest in regulating robots, human enhancement technologies, and all things in between. And that, in turn, means that typological quandaries once confined to philosophy seminars can no longer be dismissed as academic. Want, for example, to crack down on foreign “influence campaigns” by regulating social media bots? Be careful not to define “bot” too broadly (like the California legislature recently did), or the supercomputer nestled in your pocket might just make you one. Want, instead, to promote traffic safety by regulating drivers? Be careful not to presume that only humans can drive (as our Federal Motor Vehicle Safety Standards do), or you may soon exclude the best drivers on the road In this Article, we suggest that the problem isn’t simply that we haven’t hit upon the right definition.
    [Show full text]